Filter by
The language used throughout the course, in both instruction and assessments.
Results for "security analysis"
Skills you'll gain: Intrusion Detection and Prevention, Incident Response, Computer Security Incident Management, Event Monitoring, Threat Detection, Incident Management, Security Information and Event Management (SIEM), Continuous Monitoring, Network Security, Network Monitoring, Network Analysis, Document Management, Technical Documentation, Record Keeping
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
Microsoft
Skills you'll gain: Stakeholder Management, Business Analysis, Project Management, Analysis, Business Requirements, Risk Management, Microsoft Power Platform, Requirements Analysis, Problem Management
Skills you'll gain: Rmarkdown, Ggplot2, R Programming, Data Analysis, Tidyverse (R Package), Data Visualization Software, Data Cleansing, Statistical Analysis, Data Manipulation, Package and Software Management, Data Structures
Skills you'll gain: Endpoint Security, Application Security, Cloud Security, Cyber Attacks, Cybersecurity, Malware Protection, Information Systems Security, Security Awareness, Data Security, Cloud Computing, Network Security, Threat Detection, Encryption, Virtualization, Data Ethics
Skills you'll gain: Data Ethics, Data Analysis, Analytics, Data-Driven Decision-Making, Google Sheets, Business Analytics, Spreadsheet Software, Analytical Skills, Data Sharing, Data Cleansing, Data Processing, Data Strategy, Data Visualization Software, SQL
LearnKartS
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Penetration Testing, Cloud Computing, Cybersecurity, Mobile Security, Application Security, Cyber Threat Intelligence, Virtualization, Encryption, Cryptography, Vulnerability Assessments, SQL
Microsoft
Skills you'll gain: Penetration Testing, Security Testing, System Testing, Vulnerability Management, Cloud Security, Cybersecurity, Vulnerability Assessments, Intrusion Detection and Prevention, Network Security, Microsoft Azure, Firewall, Virtual Private Networks (VPN)
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Vulnerability Management, Cyber Operations, Event Monitoring, Threat Detection, Intrusion Detection and Prevention, Cybersecurity, Cyber Attacks, Security Controls, Security Information and Event Management (SIEM), Vulnerability Assessments, Network Security, Threat Management
Skills you'll gain: Vulnerability Assessments, Risk Management, Continuous Monitoring, Operational Risk, Threat Management, Intrusion Detection and Prevention, Cyber Risk, Vulnerability Management, Security Controls, Enterprise Risk Management (ERM), Risk Mitigation, Risk Analysis, Compliance Management, Security Information and Event Management (SIEM), Technical Communication, Auditing
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Artificial Intelligence
- Status: [object Object]
Google
Skills you'll gain: Computer Networking, Network Troubleshooting, Package and Software Management, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, Desktop Support, Network Security, Network Architecture, Computer Hardware, Encryption, Linux, Microsoft Windows, Lightweight Directory Access Protocols, Cybersecurity, Security Awareness, Technical Support, Software Installation, Help Desk Support
In summary, here are 10 of our most popular security analysis courses
- Sound the Alarm: Detection and Response: Google
- Cybersecurity for Everyone: University of Maryland, College Park
- Business Analysis Fundamentals: Microsoft
- Data Analysis with R Programming: Google
- Systems and Application Security: ISC2
- Foundations: Data, Data, Everywhere: Google
- Advanced Cybersecurity: LearnKartS
- Cybersecurity Tools and Technologies: Microsoft
- In the Trenches: Security Operations Center : EC-Council
- Risk Identification, Monitoring, and Analysis: ISC2